Tidecoin

Closest Vector Problem

Tidecoin uses FALCON as the signature algorithm for the signature. FALCON uses a lattice-based approach.
This article aims to briefly outline what mathematical problem is behind the encryption and why it is so powerful, also against quantum computers

Two vectors are given.

Integer numbers are used for the factors z. Therefore, a grid structure (lattice) results.  Hence the name lattice based encryption. You can see an illustration in the document.

Let us try an example with real values for the vectors b.

The following vector is now choosen randomly. Constraint is, it must not be a multiple of the vector equation and the vector must be an integer.

The goal is to find the smallest distance to the vector for the given points from the upper lattice structure (closest vector problem). We can set up a system of equations for this. However, we notice that we have two variables and two equations. So  it might be easy to solve by using a calculator.

Both values for z must be rounded to an integer so that we end up on a grid point after solving the equation.

 

We are calculating the grid point with the rounded values for z and the vectors.

The calculated lattice point is far away and certainly not the nearest neighbor of the choosen vector (27, 8). 
Even if we substitute z1 = 1 and z2 = 0 from our considerations, we get (37, 41) as a lattice point. This lattice point is closer than the calculated point.

This mathematical problem is very difficult to solve. Quantum computers will have no advantage over analogue computers here.

Lattice-based encryption, including the FALCON signature, is based on this approach.
FALCON is used by Tidecoin to protect wallets from attacks by the quantum computer.

Share:

Facebook
Twitter
Pinterest
LinkedIn

Related Posts

Quantum Computer Science

Quantum circuits researchers explore quantum circuits to make it easier for quantum computers to perform mathematical problems. In general, it can be said that almost

Falcon Signature

This article discusses the Falcon cryptographic signature algorithm, which has been selected by NIST as a post-quantum cryptography standard. Falcon is based on the theoretical

Simply Tidecoin Mining

As mentioned in other articles, Tidecoin mining algorithm is ASIC’s neutral and gpu unfriendly. Therefore, private devices can be used excellently to mine the coin.Tidecoin

Closest Vector Problem

Tidecoin uses FALCON as the signature algorithm for the signature. FALCON uses a lattice-based approach.This article aims to briefly outline what mathematical problem is behind

Technical Characteristics of the Signature

Both new NIST crypto standards for signatures (FALCON and CRYSTALS-Dilithium) are particularly suitable for time-critical applications. [page 2] Both are based on the lattice-based cryptography

Shor Algorithm- the nightmare for ECDSA

“The famous Shor algorithm allows an opponent to break ECDSA by a quantum computer that is sufficiently efficient.” page 269,  Koustav Kumar Mondal  and  Deepsubhra

Lattice Based Encryption Example

This article should give a short example, how lattice based encryptions are working. Following parameters are given. n is the number of matrixes, which are

TIDECOIN is a new future

The World Economic Forum estimates that by 2025, at least 10% of the world’s GDP, currently at USD 100 trillion, will be managed via Blockchain